WikiLeaks'
publisher Julian Assange stated: "WikiLeaks' Spy Files #3 is
part of our ongoing commitment to shining a light on the
secretive mass surveillance industry. This publication
doubles the WikiLeaks Spy Files database. The WikiLeaks Spy
Files form a valuable resource for journalists and citizens
alike, detailing and explaining how secretive state
intelligence agencies are merging with the corporate world
in their bid to harvest all human electronic
communication."

WikiLeaks' Counter Intelligence Unit has
been tracking the trackers. The WLCIU has collected data on
the movements of key players in the surveillance contractor
industry, including senior employees of Gamma, Hacking Team
and others as they travel through Azerbaijan, Bahrain,
Brazil, Spain, Mexico and other countries.

Julian Assange,
WikiLeaks' publisher, stated: "The WikiLeaks Counter
Intelligence Unit operates to defend WikiLeaks' assets,
staff and sources, and, more broadly, to counter threats
against investigative journalism and the public's right to
know."

Documents in Spy Files #3 include sensitive sales
brochures and presentations used to woo state intelligence
agencies into buying mass surveillance services and
technologies. Spy Files #3 also includes contracts and
deployment documents, detailing specifics on how certain
systems are installed and operated.

Internet spying
technologies now being sold on the intelligence market
include detecting encrypted and obfuscated internet usage
such as Skype, BitTorrent, VPN, SSH and SSL. The documents
reveal how contractors work with intelligence and policing
agencies to obtain decryption keys.

The documents also
detail bulk interception methods for voice, SMS, MMS, email,
fax and satellite phone communications. The released
documents also show intelligence contractors selling the
ability to analyse web and mobile interceptions in
real-time.

Contracts and deployment documents in the
release show evidence of these technologies being used to
indiscriminately infect users in Oman with remote-controlled
spyware. The FinFly 'iProxy' installation by Dreamlab shows
how a target is identified and malware is silently inserted
alongside a legitimate download while keeping the intended
download functioning as expected. The target identification
methods mean that anybody connecting through the same
network would be systematically and automatically
intercepted and infected as well, even unintended targets.

Scoop Citizen Members and ScoopPro Organisations are the lifeblood of Scoop.

20 years of independent publishing is a milestone, but your support is essential to keep Scoop thriving. We are building on our offering with new In-depth Engaged Journalism platform - thedig.nz.
Find out more and join us:

ALSO:

The Prime Minister has briefed Cabinet colleagues that the government will bring forward an ambitious new legislative programme for MPs’ approval, and that the current parliamentary session will be brought to an end. More>>

ALSO:

Traditionally, communiques capture the consensus reached at the meeting. In this case, the division on display between Australia and the Pacific meant the only commitment is to commission yet another report into what action needs to be taken. More>>